CrowdStrike has shared its initial findings on the recent incident that caused a widespread crash of millions of Windows devices worldwide. The company conducted a Post Incident Review (PIR) and identified a significant issue caused by a content configuration update on July 19. The update was meant to improve telemetry for detecting new threat techniques but instead resulted in out-of-bounds memory reads, leading to the infamous blue screen of death.
According to CrowdStrike, the problem affected Windows hosts running sensor version 7.11 and above that were online between 04:09 and 05:27 UTC on the day of the incident. CEO George Kurtz issued an apology, clarifying that the crash was not a result of a cyberattack but rather an internal software issue. Measures are being implemented to avoid similar incidents in the future.
The root cause of the problem was traced back to the Rapid Response Content, which is responsible for updating threat detection capabilities without changing the sensor code. The faulty update included two new IPS Template Instances to detect attacks exploiting Named Pipes. However, a bug in the Content Validator allowed one of these instances with flawed data to pass through validation, triggering the crashes.
CrowdStrike’s PIR includes steps to enhance testing and deployment processes to prevent future occurrences. These steps include more thorough testing, staggered deployment, improved monitoring, and giving customers more control over their updates. The company has also committed to releasing a full Root Cause Analysis publicly and is working with affected customers to restore normal operations.
In light of the recent events, CrowdStrike users should remain cautious of fake fixes from hackers. Businesses can also explore the best endpoint protection software and firewalls to enhance their cybersecurity measures. Stay tuned for more updates from CrowdStrike as they work towards resolving the aftermath of the incident.